id: CVE-2022-35405 info: name: Zoho ManageEngine - Remote Code Execution author: viniciuspereiras,true13 severity: critical description: | Zoho ManageEngine Password Manager Pro, PAM 360, and Access Manager Plus are susceptible to unauthenticated remote code execution via XML-RPC. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. remediation: | Apply the latest security patch or update provided by Zoho ManageEngine to fix the vulnerability. reference: - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/zoho_password_manager_pro_xml_rpc_rce.rb - https://xz.aliyun.com/t/11578 - https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html - https://www.bigous.me/2022/09/06/CVE-2022-35405.html - https://nvd.nist.gov/vuln/detail/CVE-2022-35405 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-35405 cwe-id: CWE-502 epss-score: 0.97408 epss-percentile: 0.99904 cpe: cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: zohocorp product: manageengine_access_manager_plus shodan-query: http.title:"ManageEngine" tags: cve,cve2022,rce,zoho,passwordmanager,deserialization,unauth,msf,kev http: - method: POST path: - "{{RootURL}}/xmlrpc" body: | {{randstr}}big0us matchers-condition: and matchers: - type: word part: body words: - "faultString" - type: word part: body words: - "No such service [{{randstr}}]" - "No such handler: {{randstr}}" condition: or - type: word part: body words: - "" - "" condition: or # digest: 4a0a00473045022100cf1ffcd89c15ecad5ad1211ecf12ba7a5a1836010e697e24c038e53c29a0ff41022033cb184193e64fb774431c7a257016def2f8caaffb4bd740e7a0dd859c56643e:922c64590222798bb761d5b6d8e72950